Security Tools within the Common Criteria Framework: Part 2

By on

This is the second part of a two-part article. The first part discussed security tools used to protect data integrity and the related business processes within an organization: (www.scmagazine.com/scmagazine/sc-online/2002/article/48/article.html).

In this section we will describe system and network security tools within the Common Criteria framework of functional and assurance requirements. These tools are especially useful for vulnerability assessment as defined in the CC assurance requirements. The tools discussed below can assess risks ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Most popular tech stories

Log In

Username:
Password:
|  Forgot your password?